hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Exploring Web3 Bug Bounty Programs
Medium
Exploring Web3 Bug Bounty Programs
Creating a safe Web3 is like building a super strong castle, with each digital brick adding to the decentralized structure and keeping it…
hack and bug bounty
11 Tools For Mastering Ethical Hacking
Medium
11 Tools For Mastering Ethical Hacking
A Comprehensive Guide
hack and bug bounty
Intro to Syscalls & Windows internals for malware development Pt.1
Medium
Intro to Syscalls & Windows internals for malware development Pt.1
Hello Everyone, over the years I’ve written many articles/summaries that for some reason I kept to myself and didn’t think to share them…
hack and bug bounty
Gaining Admin Access via GraphQL
Medium
Gaining Admin Access via GraphQL
This is a simple story about chaining 2 vulnerabilities to gain access to an administrative website. I’m going to share the thought process…
hack and bug bounty
A Practical Playbook to Ethical Web Hacking— Contents Based on TryHackMe Jr Penetration Tester…
Medium
A Practical Playbook to Ethical Web Hacking— Contents Based on TryHackMe Jr Penetration Tester Learning Path
Hello cybersecurity learners and enthusiasts! If you are relatively new to ethical web hacking, this is a good starter guide for you. Here…
hack and bug bounty
The Importance of Gap Analysis in ISO/IEC 27001 Version Transition
Medium
The Importance of Gap Analysis in ISO/IEC 27001 Version Transition
What is ISO 27001 Gap Analysis?
hack and bug bounty
ISO/IEC 27001:2022 Version Transition
Medium
ISO/IEC 27001:2022 Version Transition
ISO/IEC 27001 Information Security Management System (ISMS) is the most effective way to provide managerial control over the information in…
hack and bug bounty
5+All Security Resource Digest for 2023–10–2
Medium
5+All Security Resource Digest for 2023–10–2
Here are my favorite 5 security resources added to my security resource database since yesterday. These resources will range from blogs and Reddit posts, through paid resource subscriptions and…
hack and bug bounty
Linux Privilege Escalation — Weak File Permission — /etc/passwd Writable
Medium
Linux Privilege Escalation — Weak File Permission — /etc/passwd Writable
The /etc/passwd file stores user account information for each user on the system. Each line in the file represents a single user accountf
hack and bug bounty
Find Processes with EnumProcesses
Medium
Find Processes with EnumProcesses
In the dynamic and ever-evolving landscape of cybersecurity, red teamers and malware developers find themselves at the forefront of…
hack and bug bounty
Best Ethical Hacking Tools For Secure Digital Marketing Services
Medium
Best Ethical Hacking Tools For Secure Digital Marketing Services
In today’s interconnected world, where businesses harness the internet’s power to engage with their audiences, cybersecurity stands as a paramount concern. The ever-evolving landscape of cyber…
hack and bug bounty
11.1 Lab: Exploiting XXE using external entities to retrieve files | 2023
Medium
11.1 Lab: Exploiting XXE using external entities to retrieve files | 2023
This lab has a “Check stock” feature that parses XML input and returns any unexpected values in the response. To solve the lab, inject an…
hack and bug bounty
Tips and Tricks for Effective SQL Injection Testing using SQLMap Tamper Scripts
Medium
Tips and Tricks for Effective SQL Injection Testing using SQLMap Tamper Scripts
Hello, in this post, I will be sharing information about SQLMap tamper scripts. So, what is SQLMap? What are tamper scripts in SQLMap? And…
hack and bug bounty
Nmap Commands Unveiled: Surfing the Cyber Seas!
⚓
Medium
🌐
Nmap Commands Unveiled: Surfing the Cyber Seas!
⚓
Ahoy, fellow cyber-surfers!
hack and bug bounty
Read Earth X Trilogy Omnibus: Omega by Steve Pugh,Doug Braithwaite,Steve Yeowell,Steve…
Medium
Read Earth X Trilogy Omnibus: Omega by Steve Pugh,Doug Braithwaite,Steve Yeowell,Steve…
Review Earth X Trilogy Omnibus Omega by Steve Pugh Doug Braithwaite Steve Yeowell Steve Sadowski Alex Ross Jim Krueger
hack and bug bounty
Download Spy x Family, Vol. 4 by Tatsuya Endo & Tatsuya Endo
Medium
Download Spy x Family, Vol. 4 by Tatsuya Endo & Tatsuya Endo
Review Spy x Family Vol by Tatsuya Endo Tatsuya Endo
hack and bug bounty
Read Mr X Stitch Guide to Cross Stitch, The by Jamie Chalmers
Medium
Read Mr X Stitch Guide to Cross Stitch, The by Jamie Chalmers
Review Mr X Stitch Guide to Cross Stitch The by Jamie Chalmers
hack and bug bounty
Open Redirects in IoT Devices: A Look into the Future
Medium
Open Redirects in IoT Devices: A Look into the Future
The Internet of Things (IoT) has ushered in an era of unprecedented connectivity, where everyday objects are becoming smart and…
hack and bug bounty
The Art of Social Engineering in Crypto Attacks
Medium
The Art of Social Engineering in Crypto Attacks
The world of cryptocurrency has witnessed remarkable growth over the past decade, with millions of people investing in and trading digital…
hack and bug bounty
“Uncovering the Cryptojacking Epidemic” A Guide for Bug Bounty Hunters
Medium
“Uncovering the Cryptojacking Epidemic” A Guide for Bug Bounty Hunters
In the ever-evolving landscape of cybersecurity threats, a new menace has been steadily gaining ground — cryptojacking. This silent…
hack and bug bounty
nOAuth: Account Takeover via Microsoft Oauth
Medium
nOAuth: Account Takeover via Microsoft Oauth
Hi everyone, I want to share a cool and easy account takeover I recently found. I was able to perform a full account takeover via Sign In…